Device Data Protection in Mobile Healthcare Applications - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Device Data Protection in Mobile Healthcare Applications

Description:

Device Data Protection in Mobile Healthcare Applications Dasun Weerasinghe, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group School of Engineering and ... – PowerPoint PPT presentation

Number of Views:89
Avg rating:3.0/5.0
Slides: 12
Provided by: DasunWee2
Category:

less

Transcript and Presenter's Notes

Title: Device Data Protection in Mobile Healthcare Applications


1
Device Data Protection in Mobile Healthcare
Applications
  • Dasun Weerasinghe, M Rajarajan, Veselin Rakocevic
  • Mobile Networks Research Group
  • School of Engineering and Mathematical Sciences
  • City University
  • London

2
Outline of the Presentation
  • Motivation factor problem definition
  • Mobile Healthcare environment
  • Solution
  • Implementation steps
  • Conclusion

3
Motivation factor
  • Rapid increase on mobile device capabilities
  • Started using mobile devices for healthcare
    services
  • Real-time remote health monitoring devices
  • Healthcare services in disaster or emergency
    situations
  • Secure data transmission to the mobile device is
    proven
  • Using mobile devices for Healthcare is possible

4
Problem definition
  • Sensitive healthcare data stores inside the
    mobile device
  • Mobile devices can be lost or stolen
  • Unauthorized access to the sensitive data inside
    the mobile device
  • Security and Privacy protection on sensitive
    healthcare data inside a mobile device
  • Security wrapper to protect the data.

5
Mobile Healthcare Architecture
6
Proposed Solution
Encrypted health data
Healthcare service providers
Security Capsule
Decrypted health data
Security Tokens
Healthcare service providers Authentication
Service
Token Req
  • Data stored in the capsule as an encrypted format
  • Each encrypted data is linked with one or more
    security tokens
  • Decrypted data is not saved inside the mobile

7
Security Capsule Architecture
Processing Layer
Storage Layer
I/O Layer
8
Token Management
  • Different types of tokens are utilized
  • Tokens represents authentication and
    authorization for mobile capsule to access
    sensitive data
  • Tokens have a lifetime
  • Constructed in XML format
  • Tokens are protected with integrity and
    confidentiality

9
Proposed Implementation
  • Functional with
  • Token management
  • XML Signature
  • XML Encryption/Decryption
  • Key Management
  • Technologies and standards
  • XML Security
  • Single-Sign-On (SSO)
  • Liberty Alliance standards
  • Prototype with
  • J2ME Windows Mobile

10
Conclusion
  • Delivery of Healthcare data in to mobile device
    is possible
  • Provide security and privacy protection to the
    sensitive healthcare data in a mobile device was
    the challenge
  • Solution Security capsule for mobile device with
    security token management system

11
Q A ??????
Thank you !!!!!
Write a Comment
User Comments (0)
About PowerShow.com